Welcome to our cozy corner covering your online security. Here we’re diving headfirst into the cryptic waters of passkeys and passwords – the trusty gatekeepers of our digital sanctuaries. In this space we’ll talk about hashing, salting, 2FA, common mistakes, personal security mistakes and more.
You can also skip the detail if you prefer and instead head over to our FAQ for some quick answers.
The following resources may also be of interest:
- proofpoint – What is password protection?
- Tom’s Guide: “LastPass, 1Password and other password managers can be hacked: What to do now”
- Mozilla Foundation: “Aren’t All Password Managers A Hacker’s Honeypot?”
When you’ve decided that you need a password and passkey solution and don’t want to keep it on the cloud – head over to our pico vault (passkey & password manager device) page to see if it meets your expectations.
Decoding Data Security: Encryption and AES-XTS
In our increasingly digital world, protecting sensitive information is paramount. Encryption plays a crucial role in this, scrambling data (plaintext) into an unreadable format (ciphertext) accessible only with a specific key. This blog post dives into the world of encryption, focusing on the powerful AES-XTS algorithm and its role in securing data, along with the…
Unlocking the Future: The Evolution of Passwordless Authentication and Passkeys
In a digital era, password limitations necessitate secure alternatives like passwordless authentication and passkeys, which offer enhanced security and user experience through biometrics or hardware keys. Despite challenges like system compatibility and user adoption, these technologies promise a transformative future for online security and the protection of digital identities.